Robin Gandhi
Titre
Citée par
Citée par
Année
Dimensions of cyber-attacks: Cultural, social, economic, and political
R Gandhi, A Sharma, W Mahoney, W Sousan, Q Zhu, P Laplante
IEEE Technology and Society Magazine 30 (1), 28-38, 2011
1032011
Ontology-based active requirements engineering framework
SW Lee, RA Gandhi
12th Asia-Pacific Software Engineering Conference (APSEC'05), 8 pp., 2005
882005
Building problem domain ontology from security requirements in regulatory documents
SW Lee, R Gandhi, D Muthurajan, D Yavagal, GJ Ahn
Proceedings of the 2006 international workshop on Software engineering for …, 2006
662006
Requirements engineering visualization: a survey on the state-of-the-art
JR Cooper Jr, SW Lee, RA Gandhi, O Gotel
2009 Fourth International Workshop on Requirements Engineering Visualization …, 2009
582009
Building decision support problem domain ontology from natural language requirements for software assurance
SW Lee, D Muthurajan, RA Gandhi, D Yavagal, GJ Ahn
International Journal of Software Engineering and Knowledge Engineering 16 …, 2006
342006
Using semantic templates to study vulnerabilities recorded in large software repositories
Y Wu, RA Gandhi, H Siy
Proceedings of the 2010 ICSE Workshop on Software Engineering for Secure …, 2010
302010
An integrated framework for control system simulation and regulatory compliance monitoring
W Mahoney, RA Gandhi
International Journal of Critical Infrastructure Protection 4 (1), 41-53, 2011
262011
Visual analytics for requirements-driven risk assessment
RA Gandhi, SW Lee
Second International Workshop on Requirements Engineering Visualization (REV …, 2007
232007
Certification process artifacts defined as measurable units for software assurance
SW Lee, RA Gandhi, GJ Ahn
Software Process: Improvement and Practice 12 (2), 165-189, 2007
212007
Social, Political, Economic, and Cultural
R Gandhi, A Sharma, W Mahoney, W Sousan, Q Zhu, P Laplante
IEEE Technology and Society magazine 1932 (4529/11), 2011
202011
Towards a requirements-driven workbench for supporting software certification and accreditation
SW Lee, RA Gandhi, S Wagle
Third International Workshop on Software Engineering for Secure Systems …, 2007
202007
Common criteria requirements modeling and its uses for quality of information assurance (QoIA)
DS Yavagal, SW Lee, GJ Ahn, RA Gandhi
Proceedings of the 43rd annual Southeast regional conference-Volume 2, 130-135, 2005
202005
Discovering and understanding multi-dimensional correlations among certification requirements with application to risk assessment
RA Gandhi, SW Lee
15th IEEE International Requirements Engineering Conference (RE 2007), 231-240, 2007
182007
Security requirements driven risk assessment for critical infrastructure information systems
SW Lee, RA Gandhi, G Ahn
Proc. of SREIS 5, 2005
182005
Empirical results on the study of software vulnerabilities (NIER track)
Y Wu, H Siy, R Gandhi
Proceedings of the 33rd International Conference on Software Engineering …, 2011
172011
Building a social dimensional threat model from current and historic events of cyber attacks
AC Sharma, RA Gandhi, W Mahoney, W Sousan, Q Zhu
2010 IEEE Second International Conference on Social Computing, 981-986, 2010
172010
Discovering multidimensional correlations among regulatory requirements to understand risk
RA Gandhi, SW Lee
ACM Transactions on Software Engineering and Methodology (TOSEM) 20 (4), 1-37, 2011
162011
Requirements as enablers for software assurance
SW Lee, RA Gandhi
CrossTalk: The Journal of Defense Software Engineering 19 (12), 20-24, 2006
142006
Risk prioritization and management
KM Crosby, RA Gandhi, H Siy
US Patent 9,525,698, 2016
102016
Studying software vulnerabilities
RA Gandhi, H Siy, Y Wu
Crosstalk: The Journal of Defense Software Engineering, 16-20, 2010
102010
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20